Towards Comprehensive Analysis of Tor Hidden Service Access Behavior Identification under Obfs4 Scenario

5Citations
Citations of this article
6Readers
Mendeley users who have this article in their library.
Get full text

Abstract

In this paper, we present a novel approach to identify Tor hidden service access activity with key sequences under Obfs4 scenario. By calculating the key cell signals occurred during Tor hidden service access process, we get the start index and window size of the key TCP package sequence of traffic. In order to verify the effectiveness of this method, we perform comprehensive analysis under nine scenarios of different Obfs4 transmission model. We find through experimental results that there is a TCP package sequence window, which has a great contribution to identifying Tor hidden service access traffic. Only use the key TCP sequence as input, we can achieve more than 90% accuracy as well as recall in nine scenarios.

Cite

CITATION STYLE

APA

Wang, X., Li, Z., Huang, W., Wang, M., Shi, J., & Yang, Y. (2021). Towards Comprehensive Analysis of Tor Hidden Service Access Behavior Identification under Obfs4 Scenario. In ACM International Conference Proceeding Series (pp. 205–210). Association for Computing Machinery. https://doi.org/10.1145/3491396.3506532

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free